Analysis of the Cyber Attack on the Ukrainian Power Grid

March 18, 2016

This is an analysis by a joint team to provide a lessons learned community resource from the cyber attack on the Ukrainian power grid. The document is being released as Traffic Light Protocol: White (TLP: White) and may be distributed without restriction, subject to copyright controls. This document, the Defense Use Case (DUC), summarizes important learning points and presents several mitigation ideas based on publicly available information on ICS incidents in Ukraine. The E-ISAC and SANS are providing a summary of the available information compiled from multiple publicly available sources as well as analysis performed by the SANS team in relation to this event.

Spotlight

Baufest

From our service centers located in Argentina, Chile, Mexico, Peru, United States and Spain, we provide innovative software and IT solutions to more than 200 leading companies in 50 countries. Our company was born in Buenos Aires in 1991 under the name of Bauhaus, after the German design school that sought to integrate art and industry. Inspired by this vision, we translated this combination into the way we built software. In 1994, we changed to our current name, Baufest, a play-on-words meaning ''solid construction'' in German.

OTHER WHITEPAPERS
news image

The Veritas Ransomware Resiliency Strategy

whitePaper | January 19, 2023

The threat of ransomware attacks is a top concern for businesses of all types and sizes. Ransomware attacks have become commonplace with cybercriminals continuously evolving and creating new, more sophisticated ways to deliver attacks. With demands becoming excessive and the risk of data loss increasing, an advanced multi-layered resiliency strategy is needed to help ensure that your IT services are secure, resilient, and recoverable while providing the smooth user experience that your end users expect.

Read More
news image

Madcap Central Security Whitepaper

whitePaper | February 8, 2023

MadCap Central leverages the security, power, and flexibility of the cloud to mitigate or eliminate many of the technical hurdles faced by both content creators and information technology professionals. The overhead traditionally associated with managing complex systems can hinder the ability to create content and deliver content efficiently. The goal of this document is to provide a high-level overview of the ways that Central addresses these challenges.

Read More
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More
news image

The State of ICS/OT Cybersecurity in 2022 and Beyond

whitePaper | October 26, 2022

The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Given the impacts to ICS/OT, fighting these attacks requires a different set of security skills, technologies, processes, and methods to manage the different risks and risk surfaces, setting ICS apart from traditional IT enterprise networks.

Read More

Spotlight

Baufest

From our service centers located in Argentina, Chile, Mexico, Peru, United States and Spain, we provide innovative software and IT solutions to more than 200 leading companies in 50 countries. Our company was born in Buenos Aires in 1991 under the name of Bauhaus, after the German design school that sought to integrate art and industry. Inspired by this vision, we translated this combination into the way we built software. In 1994, we changed to our current name, Baufest, a play-on-words meaning ''solid construction'' in German.

Events